Skip to main content
main-content
Top

Hint

Swipe to navigate through the articles of this issue

Published in: Wireless Personal Communications 2/2022

26-07-2022

DESNN Algorithm for Communication Network Intrusion Detection

Authors: Fulai Liu, Jialiang Xu, Lijie Zhang, Ruiyan Du, Zhibo Su, Aiyi Zhang, Zhongyi Hu

Published in: Wireless Personal Communications | Issue 2/2022

Login to get access
share
SHARE

Abstract

Intrusion detection is a crucial technology in the communication network security field. In this paper, a dynamic evolutionary sparse neural network (DESNN) is proposed for intrusion detection, named as DESNN algorithm. Firstly, an ensemble neural network model is constructed, which is processed by a dynamic pruning rule and further divided into advantage subnetworks and disadvantage subnetworks. The dynamic pruning rule can effectively reduce the subnetworks weight parameters, thereby increasing the speed of the subnetworks intrusion detection. Then considering the subnetworks performance loss caused by the dynamic pruning rule, a novel evolutionary mechanism is proposed to optimize the training process of the disadvantage subnetworks. The weight of the disadvantage subnetworks approach the weight of the advantage subnetworks by the evolutionary mechanism, such that the performance of the ensemble neural network can be improved. Finally, an optimal subnetwork is selected from the ensemble neural network, which is used to detect multiple types of intrusion. Experiments show that the proposed DESNN algorithm improves intrusion detection speed without causing significant performance loss compare with other fully-connected neural network models.
Literature
1.
go back to reference Ahmim, A., Derdour, M., & Ferrag, M.A. (2018). An intrusion detection system based on combining probability predictions of a tree of classifiers. International Journal of Communication Systems, 31(9). Ahmim, A., Derdour, M., & Ferrag, M.A. (2018). An intrusion detection system based on combining probability predictions of a tree of classifiers. International Journal of Communication Systems, 31(9).
2.
go back to reference Ahmad, Z., Khan, A.S., & Shiang, C.W., et al. (2020). Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Transactions on Emerging Telecommunications Technologies. 32(1) Ahmad, Z., Khan, A.S., & Shiang, C.W., et al. (2020). Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Transactions on Emerging Telecommunications Technologies. 32(1)
3.
go back to reference Wei, P., Li, Y., Zhang, Z., et al. (2019). An optimization method for intrusion detection classification model based on deep belief network. IEEE Access., 7, 87593–87605. CrossRef Wei, P., Li, Y., Zhang, Z., et al. (2019). An optimization method for intrusion detection classification model based on deep belief network. IEEE Access., 7, 87593–87605. CrossRef
4.
go back to reference Malaiya, R. K., Kwon, D., Suh, S. C., et al. (2019). An empirical evaluation of deep learning for network anomaly detection. IEEE Access., 7, 140806–140817. CrossRef Malaiya, R. K., Kwon, D., Suh, S. C., et al. (2019). An empirical evaluation of deep learning for network anomaly detection. IEEE Access., 7, 140806–140817. CrossRef
5.
go back to reference Zheng, S. (2021). Network intrusion detection model based on convolutional neural network. IEEE 5th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC). 634-637 Zheng, S. (2021). Network intrusion detection model based on convolutional neural network. IEEE 5th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC). 634-637
6.
go back to reference Parimala, G., & Kayalvizhi, R. (2021). An effective intrusion detection system for securing IoT using feature selection and deep learning. International Conference on Computer Communication and Informatics (ICCCI), 1–4 Parimala, G., & Kayalvizhi, R. (2021). An effective intrusion detection system for securing IoT using feature selection and deep learning. International Conference on Computer Communication and Informatics (ICCCI), 1–4
7.
go back to reference Seth, S., Kaur, K., & Singh, G. (2021). A novel ensemble framework for an intelligent intrusion detection system. IEEE Access Seth, S., Kaur, K., & Singh, G. (2021). A novel ensemble framework for an intelligent intrusion detection system. IEEE Access
8.
go back to reference Denil, M., Shakibi, B., Dinh, L., et al. (2013). Predicting parameters in deep learning. Conference and Workshop on Neural Information Processing Systems. 2148-2156 Denil, M., Shakibi, B., Dinh, L., et al. (2013). Predicting parameters in deep learning. Conference and Workshop on Neural Information Processing Systems. 2148-2156
9.
go back to reference Srinivas, S., & Babu, R.V. (2015). Data-free parameter pruning for deep neural networks. British Machine Vision Conference. 2830-2838 Srinivas, S., & Babu, R.V. (2015). Data-free parameter pruning for deep neural networks. British Machine Vision Conference. 2830-2838
10.
go back to reference Ullrich, K., Meeds, E., & Welling, M. (2017). Soft weight-sharing for neural network compression. International Conference on Learning Representations Ullrich, K., Meeds, E., & Welling, M. (2017). Soft weight-sharing for neural network compression. International Conference on Learning Representations
11.
go back to reference Guo, Y.W., Yao, A.B., & Chen, Y.R. (2016). Dynamic network surgery for efficient DNNs. Conference and Workshop on Neural Information Processing Systems. 1379-1387 Guo, Y.W., Yao, A.B., & Chen, Y.R. (2016). Dynamic network surgery for efficient DNNs. Conference and Workshop on Neural Information Processing Systems. 1379-1387
12.
go back to reference Aldweesh, A., Derhab, A., & Emam, A. Z. (2020). Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues. Knowledge-Based Systems, 189, 2020. CrossRef Aldweesh, A., Derhab, A., & Emam, A. Z. (2020). Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues. Knowledge-Based Systems, 189, 2020. CrossRef
13.
go back to reference Vani, R. (2017). Towards efficient intrusion detection using deep learning techniques: a review. International Journal of Advanced Research in Computer Science and Electronics Engineering., 6(10), 375–384. Vani, R. (2017). Towards efficient intrusion detection using deep learning techniques: a review. International Journal of Advanced Research in Computer Science and Electronics Engineering., 6(10), 375–384.
14.
go back to reference Kang, M. J., Kang, J. W., & Tang, T. (2016). Intrusion detection system using deep neural network for in-vehicle network security[J]. Plos One, 11(6), e0155781. CrossRef Kang, M. J., Kang, J. W., & Tang, T. (2016). Intrusion detection system using deep neural network for in-vehicle network security[J]. Plos One, 11(6), e0155781. CrossRef
15.
go back to reference Kim, J., Kim, J., Thu, H., & Kim, H. (2016). Long short term memory recurrent neural network classfier for intrusion detection. International Conference on Platform Technology and Service. 1-5 Kim, J., Kim, J., Thu, H., & Kim, H. (2016). Long short term memory recurrent neural network classfier for intrusion detection. International Conference on Platform Technology and Service. 1-5
16.
go back to reference Feng, F., Liu, X., Yong, B., et al. (2019). Anomaly detection in ad-hoc networks based on deep learning model: A plug and play device. Ad Hoc Netw, 84, 82–89. CrossRef Feng, F., Liu, X., Yong, B., et al. (2019). Anomaly detection in ad-hoc networks based on deep learning model: A plug and play device. Ad Hoc Netw, 84, 82–89. CrossRef
17.
go back to reference Liu, G.J., & Zhang, J.B. (2020). CNID: Research of network intrusion detection based on convolutional neural network. Discrete Dynamics in Nature and Society Liu, G.J., & Zhang, J.B. (2020). CNID: Research of network intrusion detection based on convolutional neural network. Discrete Dynamics in Nature and Society
18.
go back to reference Marín, G., & Casas, P. (2018). Rawpower. Deep learning based anomaly detection from raw network traffic measurements, in: ACM SIGCOMM 2018 Conference on Posters and Demo. 7: 75–77. 2018 Marín, G., & Casas, P. (2018). Rawpower. Deep learning based anomaly detection from raw network traffic measurements, in: ACM SIGCOMM 2018 Conference on Posters and Demo. 7: 75–77. 2018
Metadata
Title
DESNN Algorithm for Communication Network Intrusion Detection
Authors
Fulai Liu
Jialiang Xu
Lijie Zhang
Ruiyan Du
Zhibo Su
Aiyi Zhang
Zhongyi Hu
Publication date
26-07-2022
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 2/2022
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-022-09817-5